Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2021.0180 Microsoft Patch Tuesday update for Windows for September 2021 15 September 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Windows Windows RT Windows Server HEVC Video Extensions MPEG-2 Video Extension Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Increased Privileges -- Remote with User Interaction Denial of Service -- Existing Account Access Confidential Data -- Remote/Unauthenticated Provide Misleading Information -- Existing Account Unauthorised Access -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-40447 CVE-2021-40444 CVE-2021-38671 CVE-2021-38667 CVE-2021-38661 CVE-2021-38644 CVE-2021-38639 CVE-2021-38638 CVE-2021-38637 CVE-2021-38636 CVE-2021-38635 CVE-2021-38634 CVE-2021-38633 CVE-2021-38632 CVE-2021-38630 CVE-2021-38629 CVE-2021-38628 CVE-2021-38624 CVE-2021-36975 CVE-2021-36974 CVE-2021-36973 CVE-2021-36972 CVE-2021-36969 CVE-2021-36967 CVE-2021-36966 CVE-2021-36965 CVE-2021-36964 CVE-2021-36963 CVE-2021-36962 CVE-2021-36961 CVE-2021-36960 CVE-2021-36959 CVE-2021-36955 CVE-2021-36954 CVE-2021-26435 Reference: ASB-2021.0177 OVERVIEW Microsoft has released its monthly security patch update for the month of September 2021. This update resolves 35 vulnerabilities across the following product(s): [1] HEVC Video Extensions MPEG-2 Video Extension Windows 10 Windows 8.1 Windows RT 8.1 Windows Server Windows Server 2012 Windows Server 2012 R2 Windows Server 2016 Windows Server 2019 Windows Server 2022 IMPACT Microsoft has given the following details regarding these vulnerabilities. Details Impact Severity CVE-2021-26435 Remote Code Execution Critical CVE-2021-36954 Elevation of Privilege Important CVE-2021-36955 Elevation of Privilege Important CVE-2021-36959 Spoofing Important CVE-2021-36960 Information Disclosure Important CVE-2021-36961 Denial of Service Important CVE-2021-36962 Information Disclosure Important CVE-2021-36963 Elevation of Privilege Important CVE-2021-36964 Elevation of Privilege Important CVE-2021-36965 Remote Code Execution Critical CVE-2021-36966 Elevation of Privilege Important CVE-2021-36967 Elevation of Privilege Important CVE-2021-36969 Information Disclosure Important CVE-2021-36972 Information Disclosure Important CVE-2021-36973 Elevation of Privilege Important CVE-2021-36974 Elevation of Privilege Important CVE-2021-36975 Elevation of Privilege Important CVE-2021-38624 Security Feature Bypass Important CVE-2021-38628 Elevation of Privilege Important CVE-2021-38629 Information Disclosure Important CVE-2021-38630 Elevation of Privilege Important CVE-2021-38632 Security Feature Bypass Important CVE-2021-38633 Elevation of Privilege Important CVE-2021-38634 Elevation of Privilege Important CVE-2021-38635 Information Disclosure Important CVE-2021-38636 Information Disclosure Important CVE-2021-38637 Information Disclosure Important CVE-2021-38638 Elevation of Privilege Important CVE-2021-38639 Elevation of Privilege Important CVE-2021-38644 Remote Code Execution Important CVE-2021-38661 Remote Code Execution Important CVE-2021-38667 Elevation of Privilege Important CVE-2021-38671 Elevation of Privilege Important CVE-2021-40444 Remote Code Execution Important CVE-2021-40447 Elevation of Privilege Important MITIGATION Microsoft recommends updating the software with the version made available on the Microsoft Update Catalogue for the following Knowledge Base articles. [1]. KB5005563, KB5005565, KB5005566, KB5005568, KB5005569 KB5005573, KB5005575, KB5005607, KB5005613, KB5005623 KB5005627 REFERENCES [1] Microsoft Security Update Guidance https://portal.msrc.microsoft.com/en-us/security-guidance AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYUF+XONLKJtyKPYoAQgQnQ/+KQ8GhVu7XJ8gn0y8W76NMM5WQ7lDY0XB Ert+NVIUa80jwGeOeZJLqt6ZF9HmAKS/FkGwE0mn3j5g0sX/95hsXHEb2EWnJ3SM YoxNy2hlIfJYFEjQWcMdWFCTScTcI+dyDwwNSw5fiY8aduK8cOSfZWycXwtFu+OR jL1raZlqD96gDz1aVV03NNUWSDi4URDdGEAIgKzM/4EW/BW5Wwv6UFHb3GanL/he yj8eSt8Bben+Q2if49JkC1ku8bj9q6uQgGFyTvp+CZSVKPk74SNVK/AOlo5+BtQz bP/EK8utwfocD2xuSad04LwBNKF3qTgI3tHFU040ZhU1oWOlxVvm8fH5H+fVnKlA 1xzdAfinJQyx/6DLIJXlx8RL7+kebvZUutEmmzlEblh6nuZLF/QVyqJ9qMOj5ZLg vDuH8pDKgp17Emcfz6nJnnBHbRQWnq6djM6qVYuQ/sOsZwFmXfHayp/wxAxivLx4 C42QU77Q4MIZ7l8VHGn1WkrzuyzWybPnVY+TP8Jy01fq4tH/unJ+5xT4UeNA7Nx0 5zYrwXjHb4kTegrUV0KUks6nB+3/fFzGgBJ7br9BXm9mFT5wpkD52rGqsLuU12TY NUIFsV8OIySNtVytfhtRMprUgxZWrwFiOlOCuVxIhUDZN5p4C8HDQ4TLlT7v6LkU ZWjdUrv0XwE= =HsTO -----END PGP SIGNATURE-----